Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

XbowCriticalHighFindings

Back
Idf8e7d6c5-4b3a-4912-8f0e-2d1c3b4a5678
RulenameXbowCriticalHighFindings
DescriptionCreates an incident for each Critical or High severity finding reported by XBOW that

is currently in an open state. These findings represent the most severe security issues

and require immediate attention. Each alert is deduplicated per finding so re-ingestion

of the same finding does not produce duplicate incidents.
SeverityHigh
TacticsInitialAccess
Execution
PrivilegeEscalation
DefenseEvasion
Impact
TechniquesT1190
Required data connectorsXbowSecurityConnector
KindScheduled
Query frequency30m
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/XBOW/Analytic Rules/XbowCriticalHighFindings.yaml
Version1.0.0
Arm templatef8e7d6c5-4b3a-4912-8f0e-2d1c3b4a5678.json
Deploy To Azure
XbowFindings_CL
| where TimeGenerated > ago(1h)
| where tolower(Severity) in ('critical', 'high')
| where isempty(State) or tolower(State) == 'open'
| summarize arg_max(TimeGenerated, *) by FindingId
| join kind=leftouter (
    XbowAssets_CL
    | summarize arg_max(TimeGenerated, *) by AssetId
    | project AssetId, StartUrl
) on AssetId
| project
    TimeGenerated,
    FindingId,
    FindingName,
    Severity,
    State,
    Summary,
    Impact,
    Mitigations,
    Recipe,
    AssetId,
    AssetName,
    OrganizationId,
    CreatedAt,
    StartUrl
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    groupByCustomDetails:
    - FindingId
    matchingMethod: Selected
    groupByAlertDetails: []
    groupByEntities: []
    lookbackDuration: 24h
    enabled: true
    reopenClosedIncident: false
requiredDataConnectors:
- dataTypes:
  - XbowFindings_CL
  - XbowAssets_CL
  connectorId: XbowSecurityConnector
relevantTechniques:
- T1190
triggerOperator: gt
customDetails:
  State: State
  CreatedAt: CreatedAt
  Mitigations: Mitigations
  AssetName: AssetName
  FindingId: FindingId
  FindingName: FindingName
  AssetId: AssetId
  OrganizationId: OrganizationId
  Severity: Severity
queryFrequency: 30m
severity: High
triggerThreshold: 0
entityMappings:
- fieldMappings:
  - columnName: StartUrl
    identifier: Url
  entityType: URL
alertDetailsOverride:
  alertDescriptionFormat: '{{Severity}} severity finding on {{AssetName}}. {{Summary}}'
  alertDisplayNameFormat: 'XBOW {{Severity}}: {{FindingName}}'
name: XbowCriticalHighFindings
query: |
  XbowFindings_CL
  | where TimeGenerated > ago(1h)
  | where tolower(Severity) in ('critical', 'high')
  | where isempty(State) or tolower(State) == 'open'
  | summarize arg_max(TimeGenerated, *) by FindingId
  | join kind=leftouter (
      XbowAssets_CL
      | summarize arg_max(TimeGenerated, *) by AssetId
      | project AssetId, StartUrl
  ) on AssetId
  | project
      TimeGenerated,
      FindingId,
      FindingName,
      Severity,
      State,
      Summary,
      Impact,
      Mitigations,
      Recipe,
      AssetId,
      AssetName,
      OrganizationId,
      CreatedAt,
      StartUrl  
version: 1.0.0
tactics:
- InitialAccess
- Execution
- PrivilegeEscalation
- DefenseEvasion
- Impact
queryPeriod: 1h
description: |
  Creates an incident for each Critical or High severity finding reported by XBOW that
  is currently in an open state. These findings represent the most severe security issues
  and require immediate attention. Each alert is deduplicated per finding so re-ingestion
  of the same finding does not produce duplicate incidents.  
kind: Scheduled
id: f8e7d6c5-4b3a-4912-8f0e-2d1c3b4a5678
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/XBOW/Analytic Rules/XbowCriticalHighFindings.yaml
eventGroupingSettings:
  aggregationKind: AlertPerResult
status: Available